CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
64.8%
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2023-50868 warning
CVE-2024-30080 critical
CVE-2024-30091 critical
CVE-2024-35250 critical
CVE-2024-30084 high
CVE-2024-30078 critical
CVE-2024-30075 critical
CVE-2024-30090 high
CVE-2024-30066 high
CVE-2024-30062 critical
CVE-2024-30093 high
CVE-2024-30087 critical
CVE-2024-30086 critical
CVE-2024-30083 critical
CVE-2024-30095 critical
CVE-2024-30067 high
CVE-2024-30077 critical
CVE-2024-30082 critical
CVE-2024-30094 critical
CVE-2024-30063 high
CVE-2024-30074 critical
CVE-2024-30065 high
CVE-2024-30070 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/5039245
support.microsoft.com/kb/5039260
support.microsoft.com/kb/5039266
support.microsoft.com/kb/5039274
support.microsoft.com/kb/5039289
support.microsoft.com/kb/5039294
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50868
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30062
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30063
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30065
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30066
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30067
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30070
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30074
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30075
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30077
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30080
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30082
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30083
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30084
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30086
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30087
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30091
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30094
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30095
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/